首页 > 最新文献

2019 5th International Conference on Web Research (ICWR)最新文献

英文 中文
Privacy Issues in Social Web of Things 社交物联网中的隐私问题
Pub Date : 2019-04-01 DOI: 10.1109/ICWR.2019.8765254
Wasswa Shafik, S. Matinkhah
Web of Things (WoT) allows users to create and share contents through a network. However, the social Web of things (SWoT) is a new concept merging the WoT and social capabilities of the modern internet. These devices are interconnected physical, social, real-time, semantic for better communication by the web. SWoT describes approaches, software architectural styles and programming designs that permit real-world objects to be part of the world communication; however, information privacy is mistreated since information is accessed in uncertainty ways by non-authoritative individuals. In this paper, we review complex privacy issues in SWoT with suggesting state of the art solutions to overcome avoidable scenarios basing on the current surveys, models, and architectures, enlightenment on the drawback’s technology users. We justify that during devices and people interaction to the SWoT through credential assessment for access, content sharing throughout communication and controlling physical things will be the main privacy issues.
物联网(Web of Things, WoT)允许用户通过网络创建和共享内容。然而,社交物联网(SWoT)是一个融合了WoT和现代互联网社交能力的新概念。这些设备是相互连接的物理的、社交的、实时的、语义的,通过网络进行更好的交流。SWoT描述的方法、软件架构风格和编程设计允许现实世界的对象成为世界交流的一部分;然而,由于非权威个人以不确定的方式访问信息,信息隐私受到了滥用。在本文中,我们回顾了SWoT中的复杂隐私问题,并根据当前的调查,模型和架构提出了最先进的解决方案,以克服可避免的情况,对缺点的技术用户的启示。我们认为,在设备和人员通过访问凭证评估与SWoT进行交互的过程中,通过通信共享内容和控制物理事物将成为主要的隐私问题。
{"title":"Privacy Issues in Social Web of Things","authors":"Wasswa Shafik, S. Matinkhah","doi":"10.1109/ICWR.2019.8765254","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765254","url":null,"abstract":"Web of Things (WoT) allows users to create and share contents through a network. However, the social Web of things (SWoT) is a new concept merging the WoT and social capabilities of the modern internet. These devices are interconnected physical, social, real-time, semantic for better communication by the web. SWoT describes approaches, software architectural styles and programming designs that permit real-world objects to be part of the world communication; however, information privacy is mistreated since information is accessed in uncertainty ways by non-authoritative individuals. In this paper, we review complex privacy issues in SWoT with suggesting state of the art solutions to overcome avoidable scenarios basing on the current surveys, models, and architectures, enlightenment on the drawback’s technology users. We justify that during devices and people interaction to the SWoT through credential assessment for access, content sharing throughout communication and controlling physical things will be the main privacy issues.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"14 1","pages":"208-214"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85988640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Cloud Security Issues Based on People, Process and Technology Model: A Survey 基于人员、流程和技术模型的云安全问题:调查
Pub Date : 2019-04-01 DOI: 10.1109/ICWR.2019.8765295
Fariba Ghaffari, Hossein Gharaee, Abouzar Arabsorkhi
Combination of utility computing and World Wide Web is base of the cloud computing. The intrinsic features of cloud computing have produced many competitive and computing benefits. The development of cloud computing and the expansion of service providers in this area has led to increase in investment in cloud computing. Large number of users on the one hand and increasing the number of sensitive data on cloud environments on the other hand, caused a dramatic growth in the motivation of malicious activities and as a result of security challenges. Solving the cloud computing security challenges need to proper knowledge of the security issues and the scope of their resolution. Security is a long-term product of interaction between people, process and technology. This categorization is based on possible solutions to security issues. Thus, the division of threats in these three areas can help the managers and security sectors to solve the security problems. Hence, in this paper, along with the comprehensive identification of cyber security challenges, we try to address these threats to categories of people, process, and technologies, in order to find cost effective, efficient and feasible security solutions based on this basis.
效用计算与万维网的结合是云计算的基础。云计算的固有特性产生了许多竞争优势和计算优势。云计算的发展和服务提供商在这一领域的扩展导致了云计算投资的增加。一方面是大量的用户,另一方面是云环境中敏感数据数量的增加,导致恶意活动的动机急剧增长,同时也带来了安全挑战。解决云计算安全挑战需要正确了解安全问题及其解决方案的范围。安全是人、过程和技术相互作用的长期产物。这种分类基于安全问题的可能解决方案。因此,对这三个领域的威胁进行划分,可以帮助管理者和安全部门解决安全问题。因此,在本文中,随着对网络安全挑战的全面识别,我们试图解决这些对人员,流程和技术类别的威胁,以便在此基础上找到具有成本效益,高效和可行的安全解决方案。
{"title":"Cloud Security Issues Based on People, Process and Technology Model: A Survey","authors":"Fariba Ghaffari, Hossein Gharaee, Abouzar Arabsorkhi","doi":"10.1109/ICWR.2019.8765295","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765295","url":null,"abstract":"Combination of utility computing and World Wide Web is base of the cloud computing. The intrinsic features of cloud computing have produced many competitive and computing benefits. The development of cloud computing and the expansion of service providers in this area has led to increase in investment in cloud computing. Large number of users on the one hand and increasing the number of sensitive data on cloud environments on the other hand, caused a dramatic growth in the motivation of malicious activities and as a result of security challenges. Solving the cloud computing security challenges need to proper knowledge of the security issues and the scope of their resolution. Security is a long-term product of interaction between people, process and technology. This categorization is based on possible solutions to security issues. Thus, the division of threats in these three areas can help the managers and security sectors to solve the security problems. Hence, in this paper, along with the comprehensive identification of cyber security challenges, we try to address these threats to categories of people, process, and technologies, in order to find cost effective, efficient and feasible security solutions based on this basis.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"28 1","pages":"196-202"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87390369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bloofi Representation for Item/User in Recommender Systems 推荐系统中项目/用户的blofi表示
Pub Date : 2019-04-01 DOI: 10.1109/ICWR.2019.8765261
Zahra Farahi, A. Moeini, A. Kamandi
In this paper, we propose new algorithms to improve the performance of recommender systems, based on hierarchical Bloom filters. Since Bloom filters can make a tradeoff between space and time, proposing a new hierarchical Bloom filter causes a remarkable reduction in space and time complexity of recommender systems. Space reduction is due to hashing items in a Bloom filter to manage the sparsity of input vectors. Time reduction is due to the structure of hierarchical Bloom filter. To increase the accuracy of the recommender systems we use Probabilistic version of hierarchical Bloom filter. The structure of hierarchical Bloom filter is B+ tree of order d. Proposed algorithms not only decrease the time complexity but also have no significant effect on accuracy
在本文中,我们提出了新的算法来提高推荐系统的性能,基于分层布隆过滤器。由于Bloom过滤器可以在空间和时间之间进行权衡,因此提出一种新的分层Bloom过滤器可以显著降低推荐系统的空间和时间复杂性。空间减少是由于在布隆过滤器中散列项目来管理输入向量的稀疏性。分层布隆滤波器的结构减少了时间。为了提高推荐系统的准确性,我们使用了概率版本的分层布隆过滤器。分层布隆滤波器的结构为d阶B+树。本文提出的算法不仅降低了时间复杂度,而且对精度没有明显影响
{"title":"Bloofi Representation for Item/User in Recommender Systems","authors":"Zahra Farahi, A. Moeini, A. Kamandi","doi":"10.1109/ICWR.2019.8765261","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765261","url":null,"abstract":"In this paper, we propose new algorithms to improve the performance of recommender systems, based on hierarchical Bloom filters. Since Bloom filters can make a tradeoff between space and time, proposing a new hierarchical Bloom filter causes a remarkable reduction in space and time complexity of recommender systems. Space reduction is due to hashing items in a Bloom filter to manage the sparsity of input vectors. Time reduction is due to the structure of hierarchical Bloom filter. To increase the accuracy of the recommender systems we use Probabilistic version of hierarchical Bloom filter. The structure of hierarchical Bloom filter is B+ tree of order d. Proposed algorithms not only decrease the time complexity but also have no significant effect on accuracy","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"40 1","pages":"67-73"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86990554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a Functional and Trustful Web-based Information Sharing Center 迈向功能可靠的网络信息共享中心
Pub Date : 2019-04-01 DOI: 10.1109/ICWR.2019.8765297
Seyedeh Negar Khajeddin, Afsaneh Madani, Hossein Gharaee, Farzaneh Abazari
As the underlying infrastructure of the Internet becomes more advanced and high-speed Internet access becomes more prevalent, the usage of web-based applications increases. Web applications provide users with a wide range of services, and providing a platform for sharing cyber security information is one of those. Studies have shown cyber actors mostly utilize the same techniques, tactics and procedures (TTPs) to attack different companies and platforms. Therefore, sharing threat data, best practices and countermeasures can help every participant in the sharing process to identify potential threats, mitigate their impacts or prevent far-reaching attacks from happening. Establishing a web-based information sharing center have been proved to be beneficial as a communication channel for assisting firms and organizations to promote their own cyber or physical security. Accordingly, in this paper we look at information sharing challenges and different trust models; we also present required technical methods, policies and regulations to overcome the introduced challenges by carefully studying established rules and regulations in the U.S. and European Union. The proposed technical methods, policies and regulations are beneficial for implementing a trustful web-based information sharing center. Finally, future work is outlined.
随着Internet的底层基础设施变得更加先进,高速Internet访问变得更加普遍,基于web的应用程序的使用也在增加。Web应用程序为用户提供了广泛的服务,提供共享网络安全信息的平台就是其中之一。研究表明,网络攻击者大多使用相同的技术、战术和程序(TTPs)来攻击不同的公司和平台。因此,共享威胁数据、最佳实践和对策可以帮助共享过程中的每个参与者识别潜在威胁,减轻其影响或防止发生影响深远的攻击。建立一个基于网络的信息共享中心已被证明是一个有益的沟通渠道,帮助公司和组织促进自己的网络或物理安全。因此,本文研究了信息共享的挑战和不同的信任模型;我们还提出了必要的技术方法、政策和法规,通过仔细研究美国和欧盟的既定规则和法规来克服引入的挑战。所提出的技术方法和政策法规有利于实现可信的基于web的信息共享中心。最后,对今后的工作进行了展望。
{"title":"Towards a Functional and Trustful Web-based Information Sharing Center","authors":"Seyedeh Negar Khajeddin, Afsaneh Madani, Hossein Gharaee, Farzaneh Abazari","doi":"10.1109/ICWR.2019.8765297","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765297","url":null,"abstract":"As the underlying infrastructure of the Internet becomes more advanced and high-speed Internet access becomes more prevalent, the usage of web-based applications increases. Web applications provide users with a wide range of services, and providing a platform for sharing cyber security information is one of those. Studies have shown cyber actors mostly utilize the same techniques, tactics and procedures (TTPs) to attack different companies and platforms. Therefore, sharing threat data, best practices and countermeasures can help every participant in the sharing process to identify potential threats, mitigate their impacts or prevent far-reaching attacks from happening. Establishing a web-based information sharing center have been proved to be beneficial as a communication channel for assisting firms and organizations to promote their own cyber or physical security. Accordingly, in this paper we look at information sharing challenges and different trust models; we also present required technical methods, policies and regulations to overcome the introduced challenges by carefully studying established rules and regulations in the U.S. and European Union. The proposed technical methods, policies and regulations are beneficial for implementing a trustful web-based information sharing center. Finally, future work is outlined.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"41 1","pages":"252-257"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90345661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey on Knowledge Extraction Techniques for Web Tables Web表知识抽取技术综述
Pub Date : 2019-04-01 DOI: 10.1109/ICWR.2019.8765271
Parvin Keshvari-Fini, Behrooz Janfada, B. Minaei-Bidgoli
Web tables are worthy sources of relational information. The number of high-quality tables with useful relational information is rapidly increasing to hundreds of millions. Some search engines usually ignore meanings of entities and relationships in indexing thus they have poor performance in tabular data to a suitable field of research is the transformation of web tables into machine-readable knowledge. We first study overview of the use of web tables in different domains then focus on understanding knowledge of web tables. The results indicate that by combining old Information Extraction techniques, and table features and general inference models can extract Knowledge from web tables.
Web表是有价值的关系信息来源。具有有用关系信息的高质量表的数量正在迅速增加到数亿。一些搜索引擎通常在索引中忽略实体的含义和关系,因此它们在表格数据中表现不佳,一个合适的研究领域是将web表格转换为机器可读的知识。我们首先研究了web表在不同领域的使用概况,然后重点了解web表的知识。结果表明,将传统的信息抽取技术、表特征和通用推理模型相结合,可以从web表中提取知识。
{"title":"A Survey on Knowledge Extraction Techniques for Web Tables","authors":"Parvin Keshvari-Fini, Behrooz Janfada, B. Minaei-Bidgoli","doi":"10.1109/ICWR.2019.8765271","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765271","url":null,"abstract":"Web tables are worthy sources of relational information. The number of high-quality tables with useful relational information is rapidly increasing to hundreds of millions. Some search engines usually ignore meanings of entities and relationships in indexing thus they have poor performance in tabular data to a suitable field of research is the transformation of web tables into machine-readable knowledge. We first study overview of the use of web tables in different domains then focus on understanding knowledge of web tables. The results indicate that by combining old Information Extraction techniques, and table features and general inference models can extract Knowledge from web tables.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"157 1","pages":"123-127"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77133110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distant Supervision for Relation Extraction in The Persian Language using Piecewise Convolutional Neural Networks 基于分段卷积神经网络的波斯语关系抽取的远程监督
Pub Date : 2019-04-01 DOI: 10.1109/ICWR.2019.8765255
Mehrdad Nasser, Majid Asgari, B. Minaei-Bidgoli
In this paper we use distant supervision for the task of relation extraction from a large corpus in the Persian language. There are supervised and unsupervised methods for relation extraction from text. In supervised relation extraction we use hand labeled corpora. This method suffers from domain dependencies and the difficulties of labeling the text. In unsupervised method, we use large corpora without having to label them but relations extracted using this method cannot be used to populate knowledge bases. Distant supervision takes advantage of large corpora without suffering from domain dependencies and can populate knowledge bases. For our experiment we use FarsBase, a knowledge base containing millions of relation instances, and align entities in 630000 Persian Wikipedia articles to these relation instances and create a distantly supervised dataset. We then extract new relation instances using piecewise convolutional neural networks and compare the results with the baseline model that uses manually extracted features.
在本文中,我们使用远程监督来完成从大型波斯语语料库中抽取关系的任务。从文本中提取关系有监督和非监督两种方法。在监督关系提取中,我们使用手工标记的语料库。这种方法存在领域依赖性和标记文本的困难。在无监督方法中,我们使用大型语料库而无需对其进行标记,但使用该方法提取的关系不能用于填充知识库。远程监督利用了大型语料库,而不会受到领域依赖的影响,并且可以填充知识库。对于我们的实验,我们使用FarsBase,一个包含数百万关系实例的知识库,并将630000篇波斯语维基百科文章中的实体与这些关系实例对齐,并创建一个远程监督数据集。然后,我们使用分段卷积神经网络提取新的关系实例,并将结果与使用手动提取特征的基线模型进行比较。
{"title":"Distant Supervision for Relation Extraction in The Persian Language using Piecewise Convolutional Neural Networks","authors":"Mehrdad Nasser, Majid Asgari, B. Minaei-Bidgoli","doi":"10.1109/ICWR.2019.8765255","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765255","url":null,"abstract":"In this paper we use distant supervision for the task of relation extraction from a large corpus in the Persian language. There are supervised and unsupervised methods for relation extraction from text. In supervised relation extraction we use hand labeled corpora. This method suffers from domain dependencies and the difficulties of labeling the text. In unsupervised method, we use large corpora without having to label them but relations extracted using this method cannot be used to populate knowledge bases. Distant supervision takes advantage of large corpora without suffering from domain dependencies and can populate knowledge bases. For our experiment we use FarsBase, a knowledge base containing millions of relation instances, and align entities in 630000 Persian Wikipedia articles to these relation instances and create a distantly supervised dataset. We then extract new relation instances using piecewise convolutional neural networks and compare the results with the baseline model that uses manually extracted features.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"1 1","pages":"96-99"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77234483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Effectiveness of Weighted Neural Network on Accuracy of Software Fault Localization 加权神经网络对软件故障定位精度的影响
Pub Date : 2019-04-01 DOI: 10.1109/ICWR.2019.8765262
Samira Rahimyar Heris, M. Keyvanpour
Considering the importance of software systems in human life, their quality assurance is very important. Fault localization is one of the software testing steps, it tries to find the exact location of fault in code. Most of automatic fault localization techniques use coverage information and results of test cases to calculate the program entities suspiciousness by similarity coefficients. The similarity coefficients designed based on the insight and understanding of developers from software system and they do not have the same performance in different scenarios. To overcome with this problem, we use the Back Propagation neural network and investigate the effect of weighted the neural network to accuracy of locating faults in software programs, because the Back propagation neural network is sensitive to weight and by the initial proper weights to the input layer neurons connections, the search space to achieve optimal weight is decreasing and network accuracy improves. We analyze the effectiveness of the proposed method with randomly weighting the input layer neurons and some basic and efficient similarity coefficients on Siemens suite benchmark. The results show that proposed method has a satisfactory performance for the software fault localization process.
考虑到软件系统在人类生活中的重要性,其质量保证是非常重要的。故障定位是软件测试的一个步骤,它试图在代码中找到故障的准确位置。大多数自动故障定位技术利用覆盖信息和测试用例的结果,通过相似系数计算程序实体的怀疑度。相似系数是基于开发人员对软件系统的洞察和理解而设计的,它们在不同的场景下具有不同的性能。为了克服这一问题,我们采用了反向传播神经网络,研究了对神经网络进行加权对软件程序故障定位精度的影响。由于反向传播神经网络对权值敏感,通过对输入层神经元连接初始化适当的权值,减小了获得最优权值的搜索空间,提高了网络的精度。通过对输入层神经元的随机加权和一些基本和有效的相似系数,在Siemens suite基准上分析了所提方法的有效性。结果表明,该方法在软件故障定位过程中具有满意的性能。
{"title":"Effectiveness of Weighted Neural Network on Accuracy of Software Fault Localization","authors":"Samira Rahimyar Heris, M. Keyvanpour","doi":"10.1109/ICWR.2019.8765262","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765262","url":null,"abstract":"Considering the importance of software systems in human life, their quality assurance is very important. Fault localization is one of the software testing steps, it tries to find the exact location of fault in code. Most of automatic fault localization techniques use coverage information and results of test cases to calculate the program entities suspiciousness by similarity coefficients. The similarity coefficients designed based on the insight and understanding of developers from software system and they do not have the same performance in different scenarios. To overcome with this problem, we use the Back Propagation neural network and investigate the effect of weighted the neural network to accuracy of locating faults in software programs, because the Back propagation neural network is sensitive to weight and by the initial proper weights to the input layer neurons connections, the search space to achieve optimal weight is decreasing and network accuracy improves. We analyze the effectiveness of the proposed method with randomly weighting the input layer neurons and some basic and efficient similarity coefficients on Siemens suite benchmark. The results show that proposed method has a satisfactory performance for the software fault localization process.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"46 1","pages":"100-104"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73696416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Experimental Evaluation of Local Sensitive Hashing Functions for Face Recognition 局部敏感哈希函数在人脸识别中的实验评价
Pub Date : 2019-04-01 DOI: 10.1109/ICWR.2019.8765276
Mahdieh Dehghani, A. Moeini, A. Kamandi
Since the number of facial images has grown in social networks, such as Facebook and Instagram, face recognition has been recognized as one of the important branches of image processing research area, and large databases of face images have been created. As a result, the response time of the face recognition system is recognized as a challenge. Fortunately, dimension reduction techniques help to reduce the number of computations significantly, which directly effects on system response time. As many facial features do not include important information, which is required for getting a better result from the face recognition systems, these techniques are applicable for facial images, as well. Local Feature Hashing (LFH) is a hash-based algorithm that has been used for face recognition. It has shown notable computational improvements over naive search and can overcome some challenges, including recognition of pose, facial expression, illumination, and partial occlusion parameters. With the aim of improving the time that it takes to run the LFH algorithm, we have tested several versions of Locality-Sensitive Hashing (LSH) algorithm. The results showed that some of these algorithms improve the response time of the LFH algorithm. In comparison with the previously conducted research, the number of input images has been increased in our tests. Besides, the number of extracted key-point vectors have been decreased, and the accuracy has not been decreased. In addition, our algorithm is able to overcome the challenge of the existence of foreign objects, such as glass. Among all different hash versions that for the first time used for face recognition, some of them are not recommended for these systems and several functions can provide minimum response time, rather than previous hash-based algorithms.
随着Facebook、Instagram等社交网络中人脸图像数量的增长,人脸识别已被公认为图像处理研究领域的重要分支之一,并创建了大型人脸图像数据库。因此,人脸识别系统的响应时间被认为是一个挑战。幸运的是,降维技术有助于显著减少计算次数,从而直接影响系统响应时间。由于许多面部特征不包含重要信息,而这些信息是人脸识别系统获得更好结果所必需的,因此这些技术也适用于人脸图像。局部特征哈希(LFH)是一种基于哈希的人脸识别算法。与朴素搜索相比,它已经显示出显著的计算改进,并且可以克服一些挑战,包括姿势、面部表情、照明和部分遮挡参数的识别。为了缩短LFH算法的运行时间,我们测试了几个版本的位置敏感散列(LSH)算法。结果表明,其中一些算法提高了LFH算法的响应时间。与之前进行的研究相比,我们的测试中输入图像的数量有所增加。同时减少了提取关键点向量的数量,精度不降低。此外,我们的算法能够克服外来物体(如玻璃)存在的挑战。在首次用于人脸识别的所有不同的哈希版本中,其中一些不推荐用于这些系统,并且有几个功能可以提供最小的响应时间,而不是以前的基于哈希的算法。
{"title":"Experimental Evaluation of Local Sensitive Hashing Functions for Face Recognition","authors":"Mahdieh Dehghani, A. Moeini, A. Kamandi","doi":"10.1109/ICWR.2019.8765276","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765276","url":null,"abstract":"Since the number of facial images has grown in social networks, such as Facebook and Instagram, face recognition has been recognized as one of the important branches of image processing research area, and large databases of face images have been created. As a result, the response time of the face recognition system is recognized as a challenge. Fortunately, dimension reduction techniques help to reduce the number of computations significantly, which directly effects on system response time. As many facial features do not include important information, which is required for getting a better result from the face recognition systems, these techniques are applicable for facial images, as well. Local Feature Hashing (LFH) is a hash-based algorithm that has been used for face recognition. It has shown notable computational improvements over naive search and can overcome some challenges, including recognition of pose, facial expression, illumination, and partial occlusion parameters. With the aim of improving the time that it takes to run the LFH algorithm, we have tested several versions of Locality-Sensitive Hashing (LSH) algorithm. The results showed that some of these algorithms improve the response time of the LFH algorithm. In comparison with the previously conducted research, the number of input images has been increased in our tests. Besides, the number of extracted key-point vectors have been decreased, and the accuracy has not been decreased. In addition, our algorithm is able to overcome the challenge of the existence of foreign objects, such as glass. Among all different hash versions that for the first time used for face recognition, some of them are not recommended for these systems and several functions can provide minimum response time, rather than previous hash-based algorithms.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"50 1","pages":"184-195"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80416329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Memetic Based Online Community Detection 基于模因的在线社区检测
Pub Date : 2019-04-01 DOI: 10.1109/ICWR.2019.8765290
Mohammad Foad Abdi, Kasra Farrokhi, M. Haeri
Community detection is one of the most important tasks in social networks analysis. This problem becomes more challenging when the structure of the network changes during the time. It is very important to update the structures of the community in a dynamic network without time-consuming procedures. This paper suggests a hybrid evolutionary algorithm for online community detection. The proposed algorithm called Memetic Based Online Community Detection (MBOC) is based on a memetic algorithm with new genetic operators and a novel stochastic local search to assign new nodes to communities and another local search called dense search to modify communities after new assignments. The method is evaluated over several well-known benchmark networks. The results show that the proposed approach outperforms the previous methods in most cases.
社区检测是社交网络分析的重要内容之一。随着时间的推移,网络结构的变化,这个问题变得更加具有挑战性。在不耗费时间的情况下,在动态网络中更新社区结构是非常重要的。提出了一种用于在线社区检测的混合进化算法。Memetic Based Online Community Detection (MBOC)是基于Memetic算法的一种新的遗传算子和一种新的随机局部搜索来分配新节点到社区,以及另一种称为密集搜索的局部搜索来修改新分配后的社区。在几个知名的基准网络上对该方法进行了评估。结果表明,在大多数情况下,该方法优于先前的方法。
{"title":"Memetic Based Online Community Detection","authors":"Mohammad Foad Abdi, Kasra Farrokhi, M. Haeri","doi":"10.1109/ICWR.2019.8765290","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765290","url":null,"abstract":"Community detection is one of the most important tasks in social networks analysis. This problem becomes more challenging when the structure of the network changes during the time. It is very important to update the structures of the community in a dynamic network without time-consuming procedures. This paper suggests a hybrid evolutionary algorithm for online community detection. The proposed algorithm called Memetic Based Online Community Detection (MBOC) is based on a memetic algorithm with new genetic operators and a novel stochastic local search to assign new nodes to communities and another local search called dense search to modify communities after new assignments. The method is evaluated over several well-known benchmark networks. The results show that the proposed approach outperforms the previous methods in most cases.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"69 1","pages":"270-275"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74515958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In the Search of Web of Intelligence 在智能网络的搜索
Pub Date : 2019-04-01 DOI: 10.1109/ICWR.2019.8765258
Mohammad Moradi, Morteza Moradi, Farhad Bayat
From the very early days, and due to its unprecedented opportunities and advantageous facilities, the Web has been revolutionizing almost every aspects of human life, technology, etc. As a dynamic phenomenon, the Web itself has experienced several major evolution stages. Such fundamental changes never thought to abolish predecessor technologies and concepts but taking them to a new level of functionality. In fact, these paradigm shifts are necessary and inevitable in order to take advantages of state of the art technologies and approaches. In this regard, social Web, semantic Web and similar nomenclatures aimed to emphasize the key idea that best represents the latest achievements and possibly future directions. Thanks to many years of research and development, the current state (version) of the Web puts forward some outstanding opportunities both to make the most of available resources/capabilities and establish the foundation of the future Web. Specifically, convergence of human intelligence (of Web users), machine intelligence (of Web agents) and intelligence of things (through Web of Things) toward shaping Web of Intelligence (WoI) can be regarded as a breakthrough in the field. The major contribution of this work is proposing a Web-based conceptual model for intelligence harvesting (i.e. Web of Intelligence) through which humans, machines and things could collaborate to solve large scale intelligence-intensive problems in a more efficient and effective way. The rationale behind this idea, its building blocks and related considerations are delineated in this paper. Moreover, a novel application based on the proposed concept, entitled comprehensive intelligent search, is introduced.
从早期开始,由于其前所未有的机会和有利的设施,网络已经彻底改变了人类生活、技术等的几乎每一个方面。作为一种动态现象,Web本身经历了几个主要的发展阶段。这种根本性的变化从未想过要废除以前的技术和概念,而是将它们提升到一个新的功能水平。事实上,为了利用最先进的技术和方法,这些范式转换是必要的和不可避免的。在这方面,社交网、语义网和类似的命名旨在强调最能代表最新成就和可能的未来方向的关键思想。由于多年的研究和开发,Web的当前状态(版本)提出了一些突出的机会,既可以充分利用可用的资源/功能,又可以建立未来Web的基础。具体来说,将人类智能(Web用户)、机器智能(Web代理)和物智能(通过物联网)融合在一起,形成智能网络(Web of intelligence, WoI),可以被视为该领域的突破。这项工作的主要贡献是提出了一个基于Web的智能收集概念模型(即智能网络),通过该模型,人类,机器和事物可以以更高效和有效的方式协作解决大规模的智能密集型问题。本文描述了这一想法背后的基本原理,其构建模块和相关考虑因素。此外,还介绍了基于该概念的一种新的应用,即综合智能搜索。
{"title":"In the Search of Web of Intelligence","authors":"Mohammad Moradi, Morteza Moradi, Farhad Bayat","doi":"10.1109/ICWR.2019.8765258","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765258","url":null,"abstract":"From the very early days, and due to its unprecedented opportunities and advantageous facilities, the Web has been revolutionizing almost every aspects of human life, technology, etc. As a dynamic phenomenon, the Web itself has experienced several major evolution stages. Such fundamental changes never thought to abolish predecessor technologies and concepts but taking them to a new level of functionality. In fact, these paradigm shifts are necessary and inevitable in order to take advantages of state of the art technologies and approaches. In this regard, social Web, semantic Web and similar nomenclatures aimed to emphasize the key idea that best represents the latest achievements and possibly future directions. Thanks to many years of research and development, the current state (version) of the Web puts forward some outstanding opportunities both to make the most of available resources/capabilities and establish the foundation of the future Web. Specifically, convergence of human intelligence (of Web users), machine intelligence (of Web agents) and intelligence of things (through Web of Things) toward shaping Web of Intelligence (WoI) can be regarded as a breakthrough in the field. The major contribution of this work is proposing a Web-based conceptual model for intelligence harvesting (i.e. Web of Intelligence) through which humans, machines and things could collaborate to solve large scale intelligence-intensive problems in a more efficient and effective way. The rationale behind this idea, its building blocks and related considerations are delineated in this paper. Moreover, a novel application based on the proposed concept, entitled comprehensive intelligent search, is introduced.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"24 1","pages":"215-220"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90478055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 5th International Conference on Web Research (ICWR)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1